Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Best Security Risk Analysis Software

Security risk analysis software solutions are used by companies to analyze IT portfolios and address potential security issues. These tools monitor networks, applications, and infrastructure to identify vulnerabilities. They then provide users with recommendations to adopt additional security practices or solutions. Companies use these tools to ensure they have a well-rounded security plan and sufficient security technologies. These solutions may have some overlap with IT portfolio analysis software but are specifically targeted toward security operations and software.

To qualify for inclusion in the Security Risk Analysis software category, a product must:

  • Analyze a company’s security software, hardware, and operations
  • Inform users of known vulnerabilities or holes in their security plan
  • Provide recommendations to optimize security planning across IT systems
G2 Grid® for Security Risk Analysis
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
content
Star Rating

Security Risk Analysis reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Security Risk Analysis Software

Results: 82
G2 takes pride in showing unbiased ratings on user satisfaction. G2 does not allow for paid placement in any of our ratings.
Results: 82
Filter Results
Filter by:
Sort by
Star Rating
Sort By:

    MaxPatrol is an all-in-one vulnerability management solution designed to provide vulnerability and compliance management for applications, databases, network and operating systems, as well as ERP (SAP), ICS/SCADA, Core Telecom and Banking infrastructure.

    Secure Configuration Manager helps you to proactively enforce security configuration policy across critical systems in evolving IT environments.

    Allows connection with external SAF compliant security systems. Available for Natural on mainframe. Read more

    Quickly identifies undiscovered vulnerabilities, so you can stay secure, harden your networks and prevent attacks in minutes.

    NopSec Unified Vulnerability Risk Management (VRM) correlates vulnerability data with your IT environment and attack patterns in the wild to help you avoid false positives and find the threats that matter. Unified VRM prioritizes security vulnerabilities based on business risk and context with proprietary threat prediction models and cyber intelligence – including malware, exploit, patching and social media feeds to predict the true probability of attacks. It replaces manual remediation tasks with automated workflow, integrated communication capabilities and incident management – guided by rich visualization dashboards for easy reporting on current status.

    OneSpan Risk Analytics achieves the twin goal of strong security and optimal user experience. It analyzes vast mobile, application and transaction data, in real-time, to effectively detect fraud and dynamically step up security to stop fraudulent transactions, improving the customer experience and defeating sophisticated fraud.

    Powertech Security Auditor is a server and S3 storage bucket security auditing and compliance reporting product. It simplifies and automates security administration tasks and compliance reporting requirements all from an easy-to-use, web-based console. For more information, visit: www.helpsystems.com

    Prevalent's comprehensive third party risk management (TPRM) platform helps your organization proactively manage third party risk through understanding that "one size does not fit all". Our integrated suite of solutions includes automated assessment software, continuous threat monitoring, and innovative vendor evidence sharing networks.

    Qualys PCI is a PCI compliance software that makes it easy for users to secure their network and meet the PCI DSS requirements. Allows them to scan all systems and web applications, and automate compliance status reporting.

    RedSeal helps customers understand their network from the inside out – providing actionable intelligence, situational awareness and a Digital Resilience Score to help enterprises measure and improve their resilience.

    SAINT developed SAINTCloud® from the ground up to provide all of the power and capability offered in our fully-integrated vulnerability management solution, SAINT Security Suite, without the need to implement and maintain on-premise infrastructure and software. This means more time spent on reducing risk – less time managing the tools you use.

    SCYTHE™ enables organizations to continuously assess their risk posture and exposure. SCYTHE combines breach and attack simulation features with vulnerability assessment and penetration testing capabilities to deliver the ability to continuously assess the security posture of an entire organization without the need for costly training, technical expertise, or complex setup.

    Secudit combines user behavior monitoring, penetration testing, and cyber-threat intelligence to provide an enterprise with an ongoing assessment of enterprise IT cyber-security vulnerability.

    The Control and Supervision Center managed by ITrust, the Security Operation Center (SOC), aims to supervise all or part of the security of an organization. Thus, you focus on your core business by entrusting the cyber security of your information system to IT security professionals.

    SecurityScorecard helps enterprises gain operational command of their security posture and the security posture of their ecosystems through continuous, non-intrusive monitoring. The company’s approach to security focuses on identifying vulnerabilities from an outside-in perspective, the same way a hacker would. SecurityScorecard’s proprietary SaaS platform offers an unmatched breadth and depth of critical data points including a broad range of risk categories such as Web, Application Security, Patching Cadence, Network Security, Hacker Chatter, Social Engineering, and Leaked Credentials, DNS Health, Endpoint Security, IP Reputation and Cubit Score.

    Threat–centric vulnerability management (TCVM) from Skybox™ Security is the best approach to managing and prioritizing vulnerabilities. Using up-to-date intelligence of your network and threats, Skybox gives you the power to target action where it matters most and be proactive against the threats of ransomware, malware, exploit kits and targeted attacks. Skybox prioritizes vulnerabilities the smart way, putting imminent threats at the top of your to-do list and helping you systematically deal with potential threats over time. Skybox looks for vulnerabilities which are: • Exposed, based on your network and security controls • Exploited in the wild or used in attacks on your industry or geography • Known to have an exploit code published • In your network but have no known exploit With attack surface visualization, vulnerability and threat intelligence and attack vector analytics, TCVM gives you the tools and context needed to pinpoint vulnerabilities posing real risk, and fix them immediately. Be ready for the next WannaCry, Heartbleed or whatever comes along with a vulnerability management program that can meet the threats of today and adapt to those of the future. To see the full suite of solutions Skybox has to offer, visit www.skyboxsecurity.com, start your 30-day free product tour or schedule a demo with your Skybox Representative today.

    Combining static analysis and data-science with modern developer tools and practices, SourceClear is the leading Software Composition Analysis platform for DevOps workflows.

    Helps people make strategic decisions & achieve remarkable outcomes by enabling them to use proven methodologies online.

    ThisData quickly detects Account Takeover (ATO) attacks by using anomaly detection and machine learning, combined with contextual information like device, location and behavior, to verify the identity of a user logging in.

    Threat and Vulnerability Management App is a vulnerability management solution that can be integrated with other IT security means and used for eventual threat prevention.

    The Risk Assessment Tool is a quick to implement, easy to use tool that helps you lock down your workstations and servers against attack.

    TraceCSO is a cloud-based platform that delivers IT GRC capability.

    With TraceInsight, you get a software tool that empowers you to reduce vulnerabilities without taking up all of your time or department resources.

    Veriflow brings formal verification to network infrastructure for the first time, continuously ensuring your network operates as intended.

    Threatcare's Violet is the only cloud-based automated cybersecurity assessment platform that enables continuous security validation.

    A suite of software tools to discover, analyze, and present cyber risk data in business terms for the enterprise.

    The network security baseline check uses technical means to check the client system, components, and network configuration. It can fully discover the lack of security of the system and components, provide detailed solutions to meet the security baseline specifications, and ensure the security of the customer's business system.

    Zeguro is a SaaS cyber safety platform that continuously monitors cyber risks for small to midsized businesses.